The attacks targeted employees of small companies, but such emails could be sent to any user’s personal mail.
Read Full Article In April 2017, we published a detailed review of a malicious program that used DNS tunneling to communicate to its C&C.
Additionally, the av utility implements a virtual keyboard to ensure data protection against stealthy keyloggers and screen capturing software when typing, a similar security module protects info when using the physical keyboard, a parental control module enables parents to oversee and restrict online access to their children by creating an "allow" schedule, an anti-spam utility weeds out malware-prone or unwanted emails, and the last security function blocks banner advertisements when surfing the web.
Our latest tests have placed Kaspersky in a top position in the antivirus software food chain, thanks to very good statistics concerning virus detection ratio and system resources consumption, along with diverse and effective extra security layers.
At first, it looked like we’d found a zero-day local privilege escalation vulnerability for Windows, but the sample that was triggering Exploit Checker events turned out to be the clean signed executable file, part of the multiplayer online game.That study prompted us to develop a technology to detect similar threats, which allowed us to collect a multitude of malware samples using DNS tunneling.Read Full Article We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.This time, we’d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.Beta-license is valid for 90 days and require an Internet connection for activation.